[security-announce] Kernel (linux-yocto 3.14): Security Update

Sona Sarmadi sona.sarmadi at enea.com
Tue Jan 5 16:09:46 CET 2016


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

	Enea Linux Security Advisory

=========================================================
Product/package: kernel (linux-yocto 3.14)
Severity: Low, Low, Medium
CVE Name: CVE-2015-2042, CVE-2015-2922, CVE-2015-3636,
Layer: meta-enea
=========================================================

This patch fixes the following vulnerabilities:
CVE-2015-2042
CVE-2015-2922
CVE-2015-3636

Description
===========
CVE-2015-2042 (Low)
net/rds/sysctl.c in the Linux kernel before 3.19 uses an incorrect
data type in a sysctl table, which allows local users to obtain
potentially sensitive information from kernel memory or possibly have
unspecified other impact by accessing a sysctl entry.

CVE-2015-2922 (Low)
The ndisc_router_discovery function in net/ipv6/ndisc.c in the
Neighbor Discovery (ND) protocol implementation in the IPv6 stack in
the Linux kernel before 3.19.6 allows remote attackers to reconfigure
a hop-limit setting via a small hop_limit value in a Router
Advertisement (RA) message.

CVE-2015-3636 (Medium)
The ping_unhash function in net/ipv4/ping.c in the Linux kernel before
4.0.3 does not initialize a certain list data structure during an
unhash operation, which allows local users to gain privileges or cause
a denial of service (use-after-free and system crash) by leveraging
the ability to make a SOCK_DGRAM socket system call for the
IPPROTO_ICMP or IPPROTO_ICMPV6 protocol, and then making a connect
system call after a disconnect.

References:
===========
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2042
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2922
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3636

Upstream/original fix (CVE-2015-2042):
=====================================
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/
patch/?id=2a9eb844a4c126b7e975a086f99f35699e88c011

Upstream/original fix (CVE-2015-2922):
=====================================
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/
patch/?id=01f69adac109867f892f12057660d891b34182f6

Upstream/original fix (CVE-2015-3636):
=====================================
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/
patch/?id=f493b53864236c924b61ef3ccbb759ac46419a32

Correction for Enea Linux for (CVE-2015-2042)
=============================================
http://git.enea.com/cgit/linux/meta-enea.git/patch/?id=6ba834ef50e5bd7de
bb89528cd129e5d0818e23c

Correction for Enea Linux for (CVE-2015-2922)
=============================================
http://git.enea.com/cgit/linux/meta-enea.git/patch/?id=cb6adb8c1d780cbaf
7f3a3f62716f58790984467

Correction for Enea Linux for (CVE-2015-3636)
=============================================
http://git.enea.com/cgit/linux/meta-enea.git/patch/?id=d92c06ddc2bb66673
c4fa94d19467ae97746f5f7

How to get the latest patches
=============================
- - If you have already cloned meta-enea, update it to get new security
patches.

cd Enea-Linux-5.0/poky/meta-enea
git pull

- - If you have not yet cloned needed repositories, do it as described
below. (Security patches are fetched implicitly when cloning the repos).

mkdir Enea-Linux-5.0
git -C Enea-Linux-5.0 clone -b dizzy git://git.enea.com/linux/poky.git
POKY=Enea-Linux-5.0/poky
git -C $POKY clone -b dizzy git://git.enea.com/linux/meta-enea.git
git -C $POKY clone -b dizzy git://git.enea.com/linux/\
meta-hierofalcon.git
git -C $POKY clone -b dizzy git://git.enea.com/linux/meta-linaro.git
git -C $POKY clone -b dizzy git://git.enea.com/linux/\
meta-openembedded.git
git -C $POKY clone -b dizzy
git://git.enea.com/linux/meta-virtualization.git
git -C $POKY/meta-enea clone -b dizzy
git://git.enea.com/linux/meta-enea/meta-vt.git


If you have any questions regarding the security patches and security
updates please contact security at enea.com.


Enea Security Team
Sona Sarmadi
Mobile: +46 70 971 4475
www.enea.com
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2
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=H2ZP
-----END PGP SIGNATURE-----



More information about the security-announce mailing list